Cached Credentials on Windows Servers joined to Azure AD Domain Services (Event 1030)

Philip Cummings 1 Reputation point
2020-08-05T06:49:55.187+00:00

Hello,

I am troubleshooting what appears to be cached credentials on domain joined windows servers and have been unable to solve it for quite some time.

Basically I have allowed users to use their domain account to RDP to certain servers which are joined to AADDS. This is working fine, however, the password policy dictates that users change their passwords every 90 days.

It seems that these domain joined servers are caching the credentials because whenever the users password is changed, the server starts generating event logs for failed group policy retrieval attempts for that specific user. If the user logs back into the server with their updated password, the events stop.

The biggest problem with this, is that the accounts start to lock themselves because of too many failed attempts. Meaning the user cannot log into other LDAP based services.

I hope i have explained it well. I've been working with microsoft for almost a year on this and have yet to find a solution. Please help!

Kind regards,
Philip

Windows
Windows
A family of Microsoft operating systems that run across personal computers, tablets, laptops, phones, internet of things devices, self-contained mixed reality headsets, large collaboration screens, and other devices.
5,329 questions
Remote Desktop
Remote Desktop
A Microsoft app that connects remotely to computers and to virtual apps and desktops.
4,509 questions
Microsoft Entra
{count} votes

1 answer

Sort by: Most helpful
  1. Philip Cummings 1 Reputation point
    2020-08-07T06:59:15.027+00:00

    16296-friendlyview.png

    16297-error-1030.png

    0 comments No comments

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.